Mannassi IT Solutions

Blog

What's happening.

Posts in Services
This is what a phishing message looks like.
Phishing 1.jpg
Phishing 2.jpg

Think you can spot a phony message a mile away? Test yourself! Which one of these messages is real and which one is a fake?

Feeling confident in your choice? Here’s the secret: both of the above images are scam messages designed to phish your email account. That’s right. Both of these very legitimate looking emails are actually the work of a hacker.

And if that didn’t scare you, this might: both of these emails made it through the built-in email security in Office 365. Even Microsoft couldn’t spot these bad-boys! The best defense is a strong offense, so we always recommend a cloud based email security service like the award winning Proofpoint to make sure these types of messages don’t even grace your inbox with their presence.

In the meantime though, how can you spot these type of sophisticated attack emails? Here’s three tips for not getting hooked by phishing scams.

1: Triple check that email address.

More often than not a phishing email address will look very close to the real thing, but still have something slightly off. For example, instead of a name@school.edu address a scam email will come from name@schooledu.com. Many scammers will also use a domain off by only a letter or two. Instead of getting an email from name@mannassi.com you’d get one from name@manassi.com. Noticing that tiny shift can save you a major security headache!

2: Urgent action (not) required.

Emails requiring urgent action on threat of your account being shut down are also suspect. Watch out for phrasing requiring you to click an embedded link to prevent your account from being closed (or the IRS from beginning an audit).

3: Brush up on your grammar skills!

Emails containing grammatical errors or otherwise broken English are also almost certainly scams. Ever-changing tense, or addressing you in a non-traditional way, in the email is a good sign that something phishy is afoot.

Of course, the best way to prevent errant clicks in scam emails is to bar them from your inbox in the first place. That’s why for the month of October we’re offering FREE Office 365 migration with the added security bonus of a month of free Proofpoint email cloud security. Because do you really have time to triple check every email that comes your way?

Follow us on Twitter and Facebook for more cybersecurity updates!

 

Swimming with the fishes!
Cybersecurity Month Times Square COMPLETE.jpg

Phishing attacks have been ubiquitous cybersecurity threats almost since the invention of email, but in 2017 hackers have really stepped up their game.

We’ve had several clients very nearly fall victim to these suped up schemes. With spoof messages that are designed to look identical to the real thing, it can be harder and harder to spot the troublemakers lurking in your mass of unread emails.

The latest attacks seem to follow the same formula: after your email is compromised it is used to send your accounting department requests for wire transfers. These scam emails look exactly like the real deal, leaving companies playing guess and check with their security and money!

The advanced nature of phishing attacks in 2017 is why we always recommend more than just your email host’s basic security options. These advanced level attacks aren’t being caught by default email security, even in Office 365, so you need an extra layer of advanced security. We’d rather be safe than sorry by using advanced cloud email security applications like the award winning Proofpoint. These can spot those tricky spoof emails and prevent them from ever daring to enter your inbox!

October is cybersecurity awareness month, so we’re offering a special email security package! Customers who sign a new 12-month contract with Mannassi IT Solutions before October 31st will get free Office 365 migration and one month of free cloud email security with Proofpoint. The best defense is a strong offense, so reach out to us today.

Want more of the latest in cybersecurity? Follow our Facebook or Twitter @MannassiIT.

It’s 11am, Do you know where your data is?

With the advent of Bring Your Own Device (BYOD) and Internet of Things (IoT) keeping track of corporate data is getting more and more difficult every day.  Employees want to get company email on their personal cell phone and tablets issued for field work often have access to and/or store company data.  Even Internet enabled devices such as hand scanners have potential to store data and credentials!  In this brave new world of connected devices, mobile device management (MDM) becomes a must. 

Having the ability to wipe data remotely from a personal device is essential to stop data leakage in its tracks.  There is a growing market for IT tools that can manage devices on the IoT.  Cisco Meraki Mobile Device Manager and VMware Airwatch are just a couple of products distinguishing themselves in this arena.

Unless you’re an expert, planning, designing, and implementing these new tools can be a major headache: taking up your valuable time trying to figure out how to fit together the puzzle pieces. Mannassi IT Solutions to the rescue! Give us a call and let us help you protect the crown jewels of your computer network.